ARTICLES

How Facebook Messenger Will Warn You From Scammers

Facebook is introducing in-app notifications feature in Messenger to warn about potential scammers. Read on to know more... Facebook is introducing in-app notifications feature in...

How to Prevent Email Spoofing & Understanding DMARC

Email Fraudsters have been spoofing emails and targeting their victims. Read on to know how to mitigate email spoofing by using DMARC... Even though the...

Why is the Microsoft Patch for Reverse RDP Attacks Vulnerable

A improper Microsoft patch for Reverse RDP attacks leaves 3rd-Party RDP clients vulnerable. Read on to know more... This year has seen a tremendous surge...

How a Stored XSS in WP Plugin Allowed Automated Takeovers

Recently, a vulnerability addressed in the WP Product Review Lite plugin could be abused by unauthenticated attackers to hack websites. Read on to know...

NEWS

HIMA empowers industrial and hazardous installations with Remote Maintenance

HIMA empowers industrial and hazardous installations with Remote Maintenance to provide Smart Safety and Cybersecurity The HIMA Group introduced a solution for remote maintenance in...

IceWarp Organizes Webinar ‘Decoding the New Tomorrow’

Highlighted the paradigm shifts in the business operations, relating to employee health security, expected  rise of remote work culture and emotional and mental stress...

Fortinet Leads the Market with Secure SD-WAN Innovation

Able to Scale from Home Office to Branch to Distributed Cloud Fortinet Solidifies its Position as the Fastest Growing SD-WAN Vendor with Over 300% Year-Over-Year...

Portshift Announces Extended Kubernetes Cluster Protection

Adding Powerful Security to the Kubernetes API Extended Kubernetes Cluster Protection Analyzes All Cluster Events, Mitigating Potential Risks in Cluster Resources and Worker Nodes Portshift announced...

INTERVIEWS

Understanding The Function of World’s First AI Powered AST Solution

We recently met Mr. Oliver Moradov, Head of Partnerships at NeuraLegion, an Israeli headquartered company with a London office, which has recently innovated a...

Interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security

In an exclusive interview with Sridhar Muppidi, IBM Fellow and CTO, IBM Security at Cybertech Israel 2019, shares his view on IBM's implementation of...

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

INDUSTRY INPUTS

Why Internet Isolation is the Key to Cyber Security

Isolation of Internet from the corporate network can secure the key digital assets of organization. Read on to know why Internet isolation is the...

Safety Expertise in the Digital Age for Critical Infrastructures

As Industrial plants have become much more complex, we look at some of the critical requirements and safety expertise for critical infrastructures and Industrial...

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...

EVENTS

GISEC 2020 – Event Information

The Gulf Information Security Expo & Conference (GISEC) 2020, event, would be held on 1 - 3 September 2020, from 10am - 6pm, at...

RSA Conference 2020 – San Francisco

RSA Conference 2020 San Francisco | February 24 - 28 | Moscone Center How do busy cybersecurity professionals stay on top of basic frameworks and emerging...

RSA Conference 2019 – Asia Pacific & Japan

RSA Conference 2019 Asia Pacific & Japan Marina Bay Sands | Singapore 16 – 18 July As the region's leading cybersecurity event, RSA Conference 2019 Asia Pacific...